Segb: Security enhanced group based aka protocol for m2m communication in an iot enabled lte/lte-a network BL Parne, S Gupta, NS Chaudhari IEEE Access 6, 3668-3684, 2018 | 88 | 2018 |
EasySMS: A protocol for end-to-end secure transmission of SMS N Saxena, NS Chaudhari IEEE Transactions on information forensics and security 9 (7), 1157-1168, 2014 | 75 | 2014 |
Nonlinear channel equalization with QAM signal using Chebyshev artificial neural network JC Patra, WB Poh, NS Chaudhari, A Das Proceedings. 2005 IEEE International Joint Conference on Neural Networks …, 2005 | 73 | 2005 |
Pragmatic sensory data semantics with service-oriented computing RS Bhadoria, NS Chaudhari Journal of Organizational and End User Computing (JOEUC) 31 (2), 22-36, 2019 | 60 | 2019 |
Cascaded bidirectional recurrent neural networks for protein secondary structure prediction J Chen, N Chaudhari IEEE/ACM Transactions on Computational Biology and Bioinformatics 4 (4), 572-582, 2007 | 59 | 2007 |
The Performance Metric for Enterprise Service Bus (ESB) in SOA system: Theoretical underpinnings and empirical illustrations for information processing RS Bhadoria, NS Chaudhari, GS Tomar Information Systems 65, 158-171, 2017 | 54 | 2017 |
Authentication protocol for an IoT-enabled LTE network N Saxena, S Grijalva, NS Chaudhari ACM Transactions on Internet Technology (TOIT) 16 (4), 1-20, 2016 | 52 | 2016 |
Construction of classifier with feature selection based on genetic programming A Purohit, NS Chaudhari, A Tiwari IEEE Congress on Evolutionary Computation, 1-5, 2010 | 41 | 2010 |
Recognition of facial expressions using local binary patterns of important facial parts R Hablani, N Chaudhari, S Tanwani International Journal of Image Processing (IJIP) 7 (2), 163-170, 2013 | 39 | 2013 |
Security vulnerabilities in handover authentication mechanism of 5G network S Gupta, BL Parne, NS Chaudhari 2018 First International Conference on Secure Cyber Computing and …, 2018 | 37 | 2018 |
Bidirectional segmented-memory recurrent neural network for protein secondary structure prediction J Chen, NS Chaudhari Soft Computing 10, 315-324, 2006 | 35 | 2006 |
Secure encryption with digital signature approach for Short Message Service N Saxena, NS Chaudhari 2012 World Congress on Information and Communication Technologies, 803-806, 2012 | 33 | 2012 |
DGBES: Dynamic group based efficient and secure authentication and key agreement protocol for MTC in LTE/LTE-A networks S Gupta, BL Parne, NS Chaudhari Wireless Personal Communications 98, 2867-2899, 2018 | 32 | 2018 |
Relevance vector machine based infinite decision agent ensemble learning for credit risk analysis S Li, IW Tsang, NS Chaudhari Expert Systems with Applications 39 (5), 4947-4953, 2012 | 31 | 2012 |
Game ai: artificial intelligence for 3d path finding YC Hui, EC Prakash, NS Chaudhari 2004 IEEE Region 10 Conference TENCON 2004., 306-309, 2004 | 30 | 2004 |
Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit M Gupta, NS Chaudhari Ad Hoc Networks 84, 56-67, 2019 | 28 | 2019 |
Segmented-memory recurrent neural networks J Chen, NS Chaudhari IEEE transactions on neural networks 20 (8), 1267-1280, 2009 | 28 | 2009 |
Design of efficient packing system using genetic algorithm based on hyper heuristic approach J Thomas, NS Chaudhari Advances in Engineering Software 73, 45-52, 2014 | 27 | 2014 |
Neural-network-based smart sensor framework operating in a harsh environment JC Patra, EL Ang, NS Chaudhari, A Das EURASIP Journal on Advances in Signal Processing 2005, 1-17, 2005 | 26 | 2005 |
PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks BL Parne, S Gupta, NS Chaudhari Peer-to-Peer Networking and Applications 12 (5), 1156-1177, 2019 | 25 | 2019 |